{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T19:50:22Z","timestamp":1722369022546},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00200-021-00506-7","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T05:02:38Z","timestamp":1621832558000},"page":"469-487","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Rewriting system of certain semigroups with three generators"],"prefix":"10.1007","volume":"34","author":[{"given":"M. S. M.","family":"Asri","sequence":"first","affiliation":[]},{"given":"W. A. M.","family":"Othman","sequence":"additional","affiliation":[]},{"given":"K. B.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"issue":"3\u20134","key":"506_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., Goldfeld, D.: An algebraic method for public-key cryptography. Math. Res. Lett. 6(3\u20134), 287\u2013291 (1999)","journal-title":"Math. Res. Lett."},{"key":"506_CR2","volume-title":"Term Rewriting and All That","author":"F Baader","year":"1999","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1999)"},{"key":"506_CR3","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s00200-006-0003-z","volume":"17","author":"G Baumslag","year":"2006","unstructured":"Baumslag, G., Fine, B., Xu, X.: Cryptosystems using linear groups. Appl. Algebra Engrg. Commun. Comput. 17, 205\u2013217 (2006)","journal-title":"Appl. Algebra Engrg. Commun. Comput."},{"key":"506_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1090\/conm\/421\/08025","volume":"421","author":"G Baumslag","year":"2006","unstructured":"Baumslag, G., Fine, B., Xu, X.: A proposed public key cryptosystem using the modular groups. Combinatorial group theory, discrete groups, and number theory. Cont. Math. 421, 35\u201343 (2006)","journal-title":"Cont. Math."},{"key":"506_CR5","doi-asserted-by":"crossref","unstructured":"Cha, J.C., Ko, K.H., Lee, S.J., Cheon, J.H., Han J.W., Cheon, J.H.: An efficient implimentation of braid groups. In: ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, Springer, Berlin, 144\u2013156 (2001)","DOI":"10.1007\/3-540-45682-1_9"},{"issue":"6","key":"506_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory IT"},{"issue":"4","key":"506_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key crytosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"506_CR8","doi-asserted-by":"crossref","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J.S., Park, C.: New public-key cryptosystem using braid groups. Advances in Cryptology\u2014CRYPTO 2000 (Santa Barbara, CA), volume 1880 of Lecture Notes in Computer Science. Springer, Berlin, 166\u2013183 (2000)","DOI":"10.1007\/3-540-44598-6_10"},{"key":"506_CR9","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/s00233-010-9248-8","volume":"81","author":"PH Kropholler","year":"2010","unstructured":"Kropholler, P.H., Pride, S.J., Othman, W.A.M., Wong, K.B., Wong, P.C.: Properties of certain semigroups and their potential as platforms for cryptosystems. Semigroup Forum 81, 172\u2013186 (2010)","journal-title":"Semigroup Forum"},{"issue":"4","key":"506_CR10","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3934\/amc.2007.1.489","volume":"1","author":"G Maze","year":"2007","unstructured":"Maze, G., Monico, C., Rosenthal, J.: Public key cryptography based on semigroup actions. Adv. Math. Commun. 1(4), 489\u2013507 (2007)","journal-title":"Adv. Math. Commun."},{"key":"506_CR11","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00200-006-0006-9","volume":"17","author":"V Shpilrain","year":"2006","unstructured":"Shpilrain, V., Zapata, G.: Combinatorial group theory and and public key cryptography. Appl. Algebra Engrg. Commun. Comput. 17, 291\u2013302 (2006)","journal-title":"Appl. Algebra Engrg. Commun. Comput."},{"key":"506_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s00200-006-0009-6","volume":"17","author":"V Shpilrain","year":"2006","unstructured":"Shpilrain, V., Ushakov, A.: The conjugacy search problem in public key cryptography: unnecessary and insufficient. Appl. Algebra Engrg. Commun. Comput. 17, 285\u2013289 (2006)","journal-title":"Appl. Algebra Engrg. Commun. Comput."},{"key":"506_CR13","doi-asserted-by":"crossref","unstructured":"Shpilrain, V., Ushakov, A.: Thompson\u2019s group and public key cryptography. volume 3531 of Lecture Notes in Computer Science. Springer Verlag, Berlin, 151\u2013164 (2005)","DOI":"10.1007\/11496137_11"},{"key":"506_CR14","doi-asserted-by":"crossref","unstructured":"Yamamura, A.: Public-key cryptosystems using the modular group. Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science. Springer, Berlin, 203\u2013216 (1998)","DOI":"10.1007\/BFb0054026"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-021-00506-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00200-021-00506-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-021-00506-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T16:04:11Z","timestamp":1681833851000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00200-021-00506-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["506"],"URL":"https:\/\/doi.org\/10.1007\/s00200-021-00506-7","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"22 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}